Secrecy and Separated Powers: Executive Privilege Revisited
نویسندگان
چکیده
منابع مشابه
Raising to powers revisited
We consider the theory of algebraically closed fields of characteristic zero with raising to powers operations. In an earlier paper we have described complete first-order theories of such a structures, provided that a diophantine conjecture CIT does hold. Here we get rid of this assumption. The theory of complex numbers with raising to real powers satisfies the description if Schanuel’s conject...
متن کاملStronger secrecy for network-facing applications through privilege reduction
Despite significant effort in improving software quality, vulnerabilities and bugs persist in applications. Attackers remotely exploit vulnerabilities in network-facing applications and then disclose and corrupt users’ sensitive information that these applications process. Reducing privilege of application components helps to limit the harm that an attacker may cause if she exploits an applicat...
متن کاملIdentifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
Privilege separation is a widely used technique to secure complex software systems. With privilege separation, software components are divided into several partitions and these partitions can only communicate through limited interfaces. However, the interfaces still provide a channel for one partition to influence code in other partitions. As a result, certain memory access patterns can be leve...
متن کاملThe Euler-Maclaurin Formula and Sums of Powers Revisited
Using the Euler-Maclaurin summation formula the strictly increasing convergence lim m → ∞ m j=1 j m m = e e − 1 is demonstrated.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2005
ISSN: 1556-5068
DOI: 10.2139/ssrn.874874